In order not to give unauthorized access to personal information, smartphones based on Android have the ability to use a “guest account”. To create it, you need to go to the “notification curtain” or to the account settings, said Evgeny Chertok, head of the IT department at Reksoft software developer.
As a rule, our smartphones contain a lot of personal information that must be protected from everyone. “For example, photographs, among which there are probably those that should not be shown to strangers for any price. In chats there is personal correspondence that cannot be shown to your family or your boss, it also contains a search history, work mail with confidential documents,” the specialist adds.
Finally, often the child can take the phone to play and inadvertently erase something important or “demolish” the usual arrangement of icons on the gadget. In addition to all of the above, our smartphones are now a means of payment and access to online banks.
When handing over our phone to someone else or even family members, we would not want to show and give access to the contents of our gadget.
To solve this problem, you can use a solution from the developers called “guest account”. It is believed that such an account is available on all android phones, starting with the fifth version.
In fact, when the guest mode is on, the stranger will receive a “clean” phone, as if it had just come from the store. To do this, you either need to go to the “notification curtain” or to the account settings and create a guest account. After that, it will appear in the selection for quick switching.
After configuring the guest login, you can put your phone into this mode. In this case, the “guest” will not be able to access documents, chats, photos, phone book, etc., he will have his own set of icons on the screen. “Anything that a guest creates in his account can be instantly deleted by deleting the guest account,” Chertok said.
In turn, the general director of ANO “Digital Platforms” named the rules that can significantly increase the security of the gadget on Ios.
First of all, it is necessary to strengthen the “entrance” security: use a complex password-code – not only numbers, but also letters. Turn on two-factor authentication in your Apple account, activate the PIN password for your SIM card.
It is also worth reducing the capabilities of a locked phone – turn off USB when the phone is locked. This will reduce the likelihood of tampering with a phone that cannot be entered. You should turn off the functions on the locked screen – calls, wallet, messages, control, and also turn off the display of notification thumbnails.
Activate the search function “Find phone” – in case of risk, you can quickly find the gadget. Also enable iCloud backup, this will allow you to quickly restore your gadget.
“Enable the function of erasing data if you enter the wrong passcode. Together with synchronization and duplication of data in the cloud, this option will help to avoid blackmail through sensitive information that may be found on your phone,” concluded Shcheltsin.